CVE-2021-23239
- EPSS 0.04%
- Published 12.01.2021 09:15:14
- Last modified 21.11.2024 05:51:25
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
CVE-2021-23240
- EPSS 0.17%
- Published 12.01.2021 09:15:14
- Last modified 21.11.2024 05:51:25
selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in p...
CVE-2019-18634
- EPSS 87.27%
- Published 29.01.2020 18:15:12
- Last modified 21.11.2024 04:33:25
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upst...
CVE-2005-4890
- EPSS 0.14%
- Published 04.11.2019 19:15:10
- Last modified 21.11.2024 00:05:25
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by...
- EPSS 0.1%
- Published 04.11.2019 16:15:11
- Last modified 21.11.2024 04:33:31
Sudo through 1.8.29 allows local users to escalate to root if they have write access to file descriptor 3 of the sudo process. This occurs because of a race condition between determining a uid, and the setresuid and openat system calls. The attacker ...
- EPSS 86.13%
- Published 17.10.2019 18:15:12
- Last modified 21.11.2024 04:26:22
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !r...
CVE-2016-7076
- EPSS 0.07%
- Published 29.05.2018 13:29:00
- Last modified 21.11.2024 02:57:24
sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec...
- EPSS 0.88%
- Published 10.10.2017 16:29:00
- Last modified 20.04.2025 01:37:25
The SHA-2 digest support in the sudoers plugin in sudo after 1.8.7 allows local users with write permissions to parts of the called command to replace them before it is executed.
CVE-2017-1000368
- EPSS 0.17%
- Published 05.06.2017 16:29:00
- Last modified 20.04.2025 01:37:25
Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution.
CVE-2017-1000367
- EPSS 19.44%
- Published 05.06.2017 14:29:00
- Last modified 20.04.2025 01:37:25
Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.